36 results on '"Yskout, Koen"'
Search Results
2. Ctam: A Tool for Continuous Threat Analysis and Management
3. Using provocative design to foster electronic informed consent innovation
4. Testing and Practical Implementation of a User-Friendly Personalized and Long-Term Electronic Informed Consent Prototype in Clinical Research: Mixed Methods Study
5. AndrAS: Automated Attack Surface Extraction for Android Applications
6. Empirical Research on Security and Privacy by Design
7. Design notations for secure software: a systematic literature review
8. Systematic Elicitation of Common Security Design Flaws
9. A reimagined catalogue of software security patterns
10. Relationship-based threat modeling
11. Additional file 2 of Using provocative design to foster electronic informed consent innovation
12. Automated Threat Analysis and Management in a Continuous Integration Pipeline
13. Evolution of Security Engineering Artifacts
14. Security and Privacy Requirements for Electronic Consent
15. Automating the early detection of security design flaws
16. Security Threat Modeling
17. Threat modeling
18. Towards Automated Security Design Flaw Detection
19. A Lingua Franca for Security by Design
20. Knowledge-enriched security and privacy threat modeling
21. Risk-based design security analysis
22. Security patterns 2.0
23. Solution-aware data flow diagrams for security threat modeling
24. Interaction-Based Privacy Threat Elicitation
25. SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment
26. A Model for Provably Secure Software Design
27. Towards a Platform for Empirical Software Design Studies
28. A Modular Meta-model for Security Solutions
29. Towards systematically addressing security variability in software product lines
30. SoSPa: A system of Security design Patterns for systematically engineering secure systems
31. MASC: Modelling Architectural Security Concerns
32. Do Security Patterns Really Help Designers?
33. Evolution of Security Engineering Artifacts
34. Knowledge-enriched security and privacy threat modeling.
35. Towards systematically addressing security variability in software product lines.
36. Automated Threat Analysis for Security and Privacy : Geautomatiseerde bedreigingsanalyse voor beveiliging en privacy
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.